Thank you for visiting us. We are currently updating our shopping cart and regret to advise that it will be unavailable until September 1, 2014. We apologise for any inconvenience and look forward to serving you again.

Wiley
Wiley.com
Print this page Share

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

ISBN: 978-1-118-69711-5
360 pages
November 2013
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions (1118697111) cover image

A must-have, hands-on guide for working in the cybersecurity profession

Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is also a useful reference for cybersecurity testing, IT test/development, and system/network administration.

  • Covers everything from basic network administration security skills through advanced command line scripting, tool customization, and log analysis skills
  • Dives deeper into such intense topics as wireshark/tcpdump filtering, Google hacks, Windows/Linux scripting, Metasploit command line, and tool customizations
  • Delves into network administration for Windows, Linux, and VMware
  • Examines penetration testing, cyber investigations, firewall configuration, and security tool customization
  • Shares techniques for cybersecurity testing, planning, and reporting

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions is a comprehensive and authoritative look at the critical topic of cybersecurity from start to finish.

See More

Introduction xix

Part I Cyber Network Security Concepts 1

Chapter 1 Executive Summary 3

Chapter 2 The Problems: Cyber Antipatterns 15

Chapter 3 Enterprise Security Using the Zachman Framework 37

Part II Cyber Network Security Hands-On 59

Chapter 4 Network Administration for Security Professionals 61

Chapter 5 Customizing BackTrack and Security Tools 103

Chapter 6 Protocol Analysis and Network Programming 115

Chapter 7 Reconnaissance, Vulnerability Assessment, and Cyber Testing 139

Chapter 8 Penetration Testing 165

Chapter 9 Cyber Network Defense Using Advanced Log Analysis 189

Part III Cyber Network Application Domains 217

Chapter 10 Cybersecurity for End Users, Social Media, and Virtual Worlds 219

Chapter 11 Cybersecurity Essentials for Small Business 233

Chapter 12 Large Enterprise Cybersecurity: Data Centers and Clouds 241

Chapter 13 Healthcare Information Technology Security 269

Chapter 14 Cyber Warfare: An Architecture for Deterrence 277

Glossary 307

Bibliography 317

Index 323

See More

Thomas J. Mowbray, PhD, holds gold-level certification from the SANS Institute in network penetration and ethical hacking. Dr. Mowbray, who has earned a doctorate in computer science, has co-authored five other professional books, including Wiley's bestseller Antipatterns: Refactoring Software, Architectures, and Projects in Crisis. After founding the Northrup Grumman Cyber Warfare Community of Practice, Dr. Mowbray joined the Certification and Accreditation Team (an elite cybersecurity test group) as their network administrator, security tools customizer, and hands-on penetration tester. At the time of writing, Dr. Mowbray is the Chief Enterprise Architect of The Ohio State University.

See More
Download TitleSizeDownload
Read Me 358 bytes Click to Download
Syllabus 195.50 KB Click to Download
All Chapter Files for Download
Chapters 1-14.
7.50 MB Click to Download
Chapter 9: Advanced Log Analysis Scripts 18.05 KB Click to Download
Chapter 1: Slides 603.99 KB Click to Download
Chapter 1: Test 28.50 KB Click to Download
Chapter 2: Slides 4.44 MB Click to Download
Chapter 2: Test 31.00 KB Click to Download
Chapter 3: Slides 3.37 MB Click to Download
Chapter 3: Test 29.50 KB Click to Download
Chapter 4: Slides 392.50 KB Click to Download
Chapter 4: Test 32.50 KB Click to Download
Chapter 5: Slides 491.50 KB Click to Download
Chapter 5: Test 29.50 KB Click to Download
Chapter 6: Slides 1.01 MB Click to Download
Chapter 6: Test 32.00 KB Click to Download
Chapter 7: Slides 278.50 KB Click to Download
Chapter 7: Test 35.50 KB Click to Download
Chapter 8: Slides 290.50 KB Click to Download
Chapter 8: Test 30.50 KB Click to Download
Chapter 9: Slides 1.61 MB Click to Download
Chapter 9: Test 32.50 KB Click to Download
Chapter 10: Slides 328.50 KB Click to Download
Chapter 10: Test 29.50 KB Click to Download
Chapter 11: Slides 282.00 KB Click to Download
Chapter 11: Test 35.00 KB Click to Download
Chapter 12: Slides 1.46 MB Click to Download
Chapter 12: Test 28.50 KB Click to Download
Chapter 13: Slides 277.00 KB Click to Download
Chapter 13: Test 30.50 KB Click to Download
Chapter 14: Slides 3.04 MB Click to Download
Chapter 14: Test 30.50 KB Click to Download
See More

Related Titles

Back to Top